Please turn on your JavaScript for this page to function normally.
Wide Open Privacy: Strategies For The Digital Life

We live in a digital age where it's become normal to see people post photos of their credit cards online, parents share on Facebook images of their newborns right from the …

Tips to minimize the risk and impact of identity fraud

Last week, a Javelin Strategy & Research report found 12.6 million victims of identity fraud in the United States in the past year, which equates to 1 victim every 3 …

Tips to overcome PHI security obstacles

Healthcare organizations’ privacy programs are still understaffed and underfunded, even while millions of patients’ protected health information (PHI) are …

SmishGuru simulated attack service launches

Wombat released SmishGuru, a simulated attack service for security officers to train employees how to recognize and avoid the most subtle yet potentially harmful smishing …

Security pros should listen with their heads, not their hearts

There is a phrase that has become quite popular in information security circles and it goes along the lines of “there are two types of organizations, those that have …

How to successfully submit conference talks

There are many ways a security professional can increase his public profile, and one of these is speaking at a conference. However, getting your work accepted at an event is …

Unintended, malicious and evil applications of augmented reality

Most new products begin life with a marketing pitch that extols the product’s virtues. A similarly optimistic property holds in user-centered design, where most books …

Social engineering: Clear and present danger

Although many companies in the information security industry prefer to tackle challenges with sophisticated hardware, the art of lying continues to be a towering risk …

Cybersecurity concerns of online dating

ThreatMetrix announced several ways for consumers to stay protected from online dating fraud and malware as Valentine’s Day approaches. According to Fast Company, online …

Identity theft protection tips

More than 11.6 million adults were victims of identity theft in 2011, according to Javelin Strategy & Research. Child identity theft is also a significant problem, which …

Five safety tips for Valentine’s Day

Whether you decide to give flowers, chocolates or something a little more unusual as the perfect symbol of your affection this Valentine’s Day, make sure you take extra …

PCI DSS cloud computing guidelines

The PCI Security Standards Council (PCI SSC) published the PCI DSS Cloud Computing Guidelines Information Supplement, a product of the Cloud Special Interest Group (SIG). …

Don't miss

Cybersecurity news